期刊文献+

基于PMD的外包数据流范围查询验证方案 被引量:1

Data Stream Range Query Authentication Scheme Based on PMD in Outsourced Database
下载PDF
导出
摘要 数据流外包服务验证问题受到广泛的关注。目前主流的外包数据查询验证技术是基于Merkle哈希树(Merkle Hash tree,MHT)的,但是其具有验证对象较大,验证过程存在冗余,安全性低,无法快速实现篡改定位的不足。针对这些不足,提出了一种基于偏序实体化摘取(partially materialized digest,PMD)策略的外包数据流范围查询验证新方案。该方案将PMD嵌入到传统MHT中,来选择MHT的部分中间节点以及根节点进行签名,那么在数据验证阶段重构MHT时无需计算大量冗余哈希值,即可验证查询结果的真实性和完整性。最后将所提方案具体应用到数据流单次和滑动窗口范围查询中,使得客户端能够高效率地验证由第三方所提供的结果是真实和完整的。 Data stream range query authentication problem has been receiving widespread attention. The main query authentication method is based on Merkle Hash tree(MHT), which has disadvantages such as large verification object(VO), redundant verification procedures, low security and disability to locate tampering quickly. To overcome the above disadvantages, this paper proposes a new data stream range query authentication method based on partially materialized digest(PMD) scheme, where the PMD scheme is embedded in the traditional MHT, and some internal nodes and the root node in MHT are signed, instead of only the root node. Thus in the process of query results authentication, there is no need to compute much redundant hash value when reconstructing the MHT and verifying the authenticity and completeness of the query answers. Finally, the proposed scheme is applied into one-shot and sliding window range queries over data stream, where the authenticity and completeness of the query answers can be proved efficiently.
出处 《计算机科学与探索》 CSCD 北大核心 2015年第10期1209-1218,共10页 Journal of Frontiers of Computer Science and Technology
基金 国家自然科学基金 安徽大学科研建设经费 镇江市工业支撑计划项目~~
关键词 数据流 查询验证 外包数据 Merkle哈希树(MHT) data stream query authentication outsourced database Merkle Hash tree(MHT)
  • 相关文献

参考文献24

  • 1Hacigumus H,Iyer B,Mehrotra S.Providing database as a service[C]//Proceedings of the 18th International Conference on Data Engineering,San Jose,USA,Feb 26-Mar 01,2002.Piscataway,NJ,USA:IEEE,2002:29-38.
  • 2Goldwasser S,Micali S,Rivest R L.A digital signature scheme secure against adaptive chosen-message attacks[J].SIAM Journal on Computing,2013,17(2):281-308.
  • 3Merkle R C.A certified digital signature[M].New York:Springer,1990:218-238.
  • 4Kuty?owski M,Kubiak P.Lightweight digital signature with secretly embedded warning[J].Control and Cybernetics,2013,42(4):825-827.
  • 5Merkle R C.Protocols for public key crytosystems[C]//Proceedings of the 1980 IEEE Symposium on Security and Privacy,Oakland,USA,Apr 1980.Washington,DC,USA:IEEE Computer Society,1980:122-136.
  • 6Li Feifei,Yi Ke,Hadjieleftheriou M,et al.Proof-infused streams:enabling authentication of sliding window queries on streams[C]//Proceedings of the 33rd International Conference on Very Large Data Bases,Vienna,Austria,Sep 23-28,2007:147-158.
  • 7黄浩,杨卫东.数据流上Ad Hoc查询的自适应处理算法[J].计算机工程,2013,39(9):74-79. 被引量:2
  • 8Devanbu P,Gertz M,Kwong A,et al.Flexible authentication of XML documents[J].Journal of Computer Security,2004,12(6):841-864.
  • 9Goldwasser S,Kalai Y T,Rothblum G N.Delegating computation:interactive proofs for muggles[C]//Proceedings of the 40th Annual ACM Symposium on Theory of Computing,Victoria,Canada,May 17-20,2008.New York,NY,USA:ACM,2008:113-122.
  • 10温涛,盛刚,郭权,盛国军.追加型数据库外包中的查询结果验证[J].计算机研究与发展,2012,49(10):2077-2085. 被引量:3

二级参考文献54

  • 1耿志华,王晓玲,周傲英.XDrill:基于文件差异的XML文档压缩算法[J].计算机研究与发展,2007,44(z3):379-385. 被引量:3
  • 2Hacigumus H, Mehrotra S, Iyer B, et al. Providing Database as a Service[C]//Proc. of the 18th International Conference on Data Engineering. San Jose, CA, USA: IEEE Computer Society, 2002.
  • 3Merkle R C. Protocols for Public Key Cryptosystems[C]//Proc. of IEEE Symposium on Research in Security and Privacy. [S. l.]: IEEE Press, 1980.
  • 4Devanbu P, Gertz M, Martel C, et al. Authentic Third-party Data Publication[C]//Proc. of the 14th IFIP TCll/WGI1.3 Annual Working Conference on Database Security. Schood, Netherlands: [s. n.], 2000.
  • 5Mykletun E, Narasimha M, Tsudik G DSAC: Integrity for Outsoumed Databases with Signature Aggregation and Chaining[C]//Proc. of ACM CIKM'05. New York, USA: ACM Press, 2005.
  • 6Li Feifei, Marios H, George K, et al. Dynamic Authenticated Index Structures for Outsourced Database[C]//Proc. ofACM SIGMOD'06 Chicago, Illinois, USA: ACM Press, 2006.
  • 7Kyriakos M, Dimitris S, HweeHwa Pang. Partially Materialized Digest Scheme: An Efficient Verification Method for Outsourced Databases[J]. VLDB, 2009, 18(1): 345-362.
  • 8Min J,Park M,Chung C.A compressor for effective archiving,retrieval,and update of XML documents[J].ACM Trans on Internet Technologies,2006,6(3):155-164.
  • 9Arion A,Bonifati A,Costa G,et al.Xquec:Pushing queries to compressed XML data[C] //Proc of 29th Int Conf on Very Large Data Bases.San Francisco:Morgan Kaufmann,2006:1065-1068.
  • 10Sakr S.XML compression techniques:A survey and comparison[J].Journal of Computer and System Sciences,2009,75(5):303-322.

共引文献13

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部